As the author of "The Cybersecurity Architect's Handbook," I've recently had the profoundly humbling experience of reading a thoughtful review from cybersecurity expert David T. (CISSP, CCP, CFCI, CCCI).
This "Deep Dive," generated through AI in a podcast style, provides a review of the main themes and important ideas presented in the "Cybersecurity Architect's Handbook."
The latest episode of 45Drives' "What's Spinnin' Podcast" has just dopped. Brett sits down with me to explore my 25-year journey through the cybersecurity landscape. We also discuss my book, the "Cybersecurity Architect's Handbook," and how it has evolved throughout my career.
In my previous post comparing Pi-hole versus Adguard Home, I mentioned I use Pi-hole with Unbound DNS. Let's explore why this setup is beneficial and how to implement it step by step.
The cybersecurity community continually amazes me with its dedication to excellence and collaborative spirit. This was recently highlighted when the CEO of Zenarmor shared his thoughts about my book, "The Cybersecurity Architect's Handbook" ...
The "Cybersecurity Architects Handbook" continues to maintain its position in the top 100 across multiple Amazon technical categories, including Network Disaster & Recovery Administration, Computer Cryptography, and Web Encryption since its release at the end of March 2024.
Being a part of the tinkerers club for Zenarmor and providing feedback and feature requests/capabilities, I can confidently say the 1.18 version of Zenarmor represents a significant evolution in their SASE offering.